Page 444 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 444

or the verification path. By forcing a reverification of all stages of

                  trust, you can reestablish all trust links and prove that the assumed
                  trust remains assured.




               Certificate Generation and Destruction

               The technical concepts behind the public key infrastructure are
               relatively simple. In the following sections, we’ll cover the processes
               used by certificate authorities to create, validate, and revoke client
               certificates.


               Enrollment

               When you want to obtain a digital certificate, you must first prove your

               identity to the CA in some manner; this process is called enrollment.
               As mentioned in the previous section, this sometimes involves
               physically appearing before an agent of the certification authority with
               the appropriate identification documents. Some certificate authorities
               provide other means of verification, including the use of credit report
               data and identity verification by trusted community leaders.

               Once you’ve satisfied the certificate authority regarding your identity,

               you provide them with your public key. The CA next creates an X.509
               digital certificate containing your identifying information and a copy
               of your public key. The CA then digitally signs the certificate using the
               CA’s private key and provides you with a copy of your signed digital
               certificate. You may then safely distribute this certificate to anyone
               with whom you want to communicate securely.



               Verification
               When you receive a digital certificate from someone with whom you

               want to communicate, you verify the certificate by checking the CA’s
               digital signature using the CA’s public key. Next, you must check and
               ensure that the certificate was not revoked using a certificate
               revocation list (CRL) or the Online Certificate Status Protocol (OCSP).
               At this point, you may assume that the public key listed in the

               certificate is authentic, provided that it satisfies the following
               requirements:
   439   440   441   442   443   444   445   446   447   448   449